South College IT

Explore Cybersecurity Tips

Expert Advice from South College CIO Jeremy Underwood.

A person in glasses sits at a desk with multiple computer monitors, focusing intently on the screens. The background shows another individual working at a similar setup, with servers or mainframes visible behind them. The room is dimly lit with blue lighting.

How Can You Protect Yourself from Cybersecurity Threats?

Cybersecurity 101: How to Protect Yourself from Scams, Identity Theft, and Online Threats

Why Cybersecurity Matters More Than Ever

If you have a:

  • Phone
  • Laptop
  • Email
  • Social media account
  • Smart TV

You are a target.

Cybercrime is rising rapidly, and today’s attacks are more sophisticated than ever—powered by automation, data mining, and even AI.

In this episode of Live From South College, Chief Information Officer Jeremy Underwood breaks down how students (and anyone online) can protect themselves from growing digital threats.

What Is Cybersecurity—and Why Should You Care?

Cybersecurity isn’t just about protecting institutions.

It’s about protecting:

  • Your identity
  • Your finances
  • Your future

Every time you:

  • Shop online
  • Apply for loans
  • Submit assignments
  • Log into apps

…you leave a digital footprint.

And if you’re not careful, that data can be stolen, misused, or exploited.

What Is Ransomware?

Ransomware is one of the fastest-growing cyber threats today.

Ransomware is when hackers lock your files or device and demand money to restore access.

Example:

  • Your laptop is locked
  • A message appears demanding payment
  • Your files are inaccessible

How to Avoid Ransomware

  • Don’t click suspicious links
  • Never download unknown files
  • Keep software updated
  • Back up important data regularly

Most Common Cyber Threats Students Face

According to cybersecurity experts, students are frequent targets for:

Phishing Emails – Fake messages designed to steal login info

Fake Job Offers – Scams posing as recruiters or employers

Scholarship Scams – “Free money” traps that steal personal data

Social Media Hijacking – Fake login pages capturing credentials

Critical Rule

Never reuse passwords across accounts – If one account is compromised, all of them can be.

What Happens If You Click a Suspicious Link?

Clicking the wrong link can lead to:

  • Stolen login credentials
  • Access to your email or cloud storage
  • Exposure of your contact list
  • Full device control (camera, files, etc.)

The Scariest Scenario

Sometimes… nothing happens immediately.

That means:
Hackers may be silently collecting your data.

How to Protect Yourself from Identity Theft

Identity theft can damage your credit before your career even begins.

Here Are Best Practices:

 Use Strong, Unique Passwords

(Pro tip: use long phrases or song lyrics)

Enable Multi-Factor Authentication (MFA)

Adds a second layer of protection

Limit Social Media Sharing

Hackers use personal info to guess security questions

Monitor Your Credit

Use free tools to detect breaches early.

 Never Share Sensitive Info via Email/Text

How to Stay Safe at Home (Smart Devices Included)

Your home network is now a digital ecosystem. Risks Include:

  • Smart TVs
  • Voice assistants
  • Connected appliances
  • Public Wi-Fi usage

How to Protect Your Home

  • Keep all devices updated
  • Avoid public Wi-Fi when possible
  • Use secure networks only
  • Understand what each device can access

Real-Life Scam Example (And What to Learn)

A student’s parent receives a text:

“Mom, I’m in trouble. I need $500. Don’t tell dad.”

It uses:

  • The correct name
  • Urgency
  • Emotional manipulation

This is how modern scams work.

Prevention & Lesson:

Always verify through a trusted method before responding. Ask your “child” a question in text only they would know the answer to.

The Role of AI in Cybercrime

Cyber threats are evolving rapidly due to AI.

Here Are The Emerging Risks

  • AI-generated phishing emails
  • Voice impersonation (deepfake audio)
  • Hyper-personalized scams

The Reality

Cybercrime is not slowing down—it’s accelerating.

Which means full awareness is now essential.

Equally Important: How to Shop Safely Online

If you shop online (and who doesn’t), follow these rules:

1. Only Buy from Trusted Brands

If you don’t recognize the company:

  • Check third-party review sites
  • Avoid impulse purchases from ads

2. Verify Emails Before Clicking

Example:

  • Email says “Costco” But click the email address to see who is “really is
  • Actual sender = random Gmail address

Immediate red flag!

3. Don’t Click Text Message Links

Instead:

  • It may look like “Amazon” in text or UPS. But, open the official app first
  • Check notifications there

4. Use Protected Platforms

Safer options include:

  • Aggregated marketplaces like eBay or amazon or Etsy
  • Verified shopping apps like Shop app by Shopify
  • Credit card-backed purchases like Capital One Shopping

5. Protect Your Personal Data

Before entering:

  • Your Email
  • Your Phone number
  • Your Payment info

Ask Yourself: “Do I trust this company?”

 Pro Tip

Create a “junk email” for:

  • Promotions
  • New accounts
  • Shopping sites

Why Cybersecurity Careers Are Booming

Cybersecurity isn’t just a concern—it’s a career opportunity.

Demand for Cybersecurity Professionals Is Exploding

Every organization today is:

  • Digital
  • Data-driven
  • Vulnerable

Career Outlook

Graduates in cybersecurity can expect:

  • Strong job demand
  • Competitive salaries
  • Meaningful, mission-driven work

Quick Facts on Cybersecurity

Q: What is ransomware?
A: A cyberattack that locks your data and demands payment for access.

Q: What is the biggest cybersecurity mistake?
A: Reusing passwords across multiple accounts.

Q: What should you do if you get a suspicious email?
A: Do not click links—verify the sender first.

Q: How can you prevent identity theft?
A: Use strong passwords, enable MFA, and limit personal data sharing.

Q: Is cybersecurity a good career?
A: Yes—it’s one of the fastest-growing and most in-demand fields.

Final Takeaway

Cybersecurity is no longer optional. It’s part of everyday life.

And the best defense?

Awareness + smart habits + staying vigilant

Interested in professional opportunities within the Computer Science & Engineering field? Click here for more information.
Bachelor of Science in Cybersecurity

Earn your bachelor’s degree 100% online in an evolving and fascinating field. Start working toward tomorrow’s opportunities in cybersecurity today.

Online See Program
_facebook-squarearrow-leftarrow-rightbuildingcalendarcaret-down-blackcaret-down-greycaret-downcaret-rightcheckboxchevron-downchevron-leftchevron-rightcircleclose-xcloseconfettiemailfacebook-squarehamburgerinstagram-squarelarge-caret-downlarge-ellipselinkedin-squaremailmap-pinpausephoneplayprofileschool-capsearchsouth-college-circlespinnertwitter-squareyoutube-square